The target URL doesn't tell us what the plugin is doing. It's obviously POSTing something to your site but any other information is lost in the POST request parameters. Since you don't know how to use the browser dev tools to find out what this is you can send me the detailed Admin Tools log file so I can help you. Here's how.
Admin Tools, Web Application Firewall, Configure WAF, Logging & Reporting. Set “Keep a debug log file” to Yes.
Reproduce your issue. This is important! Turning on the log file obviously doesn't act on the past blocked requests. We need a new blocked request to happen so it gets logged.
Find the file admintools_breaches.php in your site's logs folder (by default: administrator/logs/admintools_breaches.php)
Download it to your computer.
Change its extension from .php to .txt
Put it in a ZIP file.
Attach the ZIP file to your next reply.
Admin Tools, Web Application Firewall, Configure WAF, Logging & Reporting. Set “Keep a debug log file” to No.
Nicholas K. Dionysopoulos
Lead Developer and Director
🇬🇷Greek: native 🇬🇧English: excellent 🇫🇷French: basic • 🕐 My time zone is Europe / Athens
Please keep in mind my timezone and cultural differences when reading my replies. Thank you!